Week 7: Key principles that are use to secure TCP/IP.




Fundamentally, TC/IP are not meant to be secure. This protocol does a lot, but it is not secure. Fortunately, there is room to implement to secure the protocol. Here are the five principles that are used to secure TC/IP: encryption, integrity, nonrepudiation, authentication, and authorization.

·       Encryption is the process of scrambling the data in which if it gets intercepted, they wouldn’t be able to read the data.

·       Integrity is the process of making sure the same data is received as originally sent.

·       Nonrepudiation is the process of holding people accountable in case they change the data through taking a log or other source for verification.

·       Authentication is the processing of verifying the identity of a person that is accessing the data and to verify to make sure the person is who they say they are.

·       Authorization is what an authenticated person has access to when it comes to the data.

Although not all layers of TCP/IP have the level of security, some layers uses one of this principle to make the protocol secure. 

Popular posts from this blog

Week1: Introduction and Cloud Computing

Week 12: Tools for Monitoring Network and Blog Wrap-up

Week 3: Migration to the Cloud